Free CISSP-ISSMP Exam Braindumps (page: 13)

Page 12 of 55

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

  1. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
  2. It determines the actions and behaviors of a single individual within a system
  3. It ensures that modifications are not made to data by unauthorized personnel or processes.
  4. It ensures that internal information is consistent among all sub entities and also consistent with the real-world, external situation.

Answer(s): A,C,D



Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."

  1. Cost Plus Fixed Fee
  2. Cost Plus Percentage of Cost
  3. Cost Plus Incentive Fee
  4. Cost Plus Award Fee

Answer(s): B



Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

  1. IFB
  2. RFQ
  3. RFP
  4. RFI

Answer(s): D



Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

  1. IP spoofing
  2. Broadcast storm
  3. Password sniffing
  4. DoS attack

Answer(s): A,C






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts